• 제목/요약/키워드: Active Management

검색결과 2,974건 처리시간 0.032초

또래괴롭힘 집단에 따른 아동의 인성특성, 부모에 대한 애착 및 부모의 부부갈등 (Children's Personality Traits, Parent Attachment, Parents' Marital Conflict, and Aggression/victimization Status)

  • 박보경;한세영;최미경;도현심
    • 가정과삶의질연구
    • /
    • 제22권1호
    • /
    • pp.45-54
    • /
    • 2004
  • To examine group differences among four groups divided by asgression/victimization status, 655 4th graders living in Seoul reported their perceptions of peer aggression, peer victimization, personality traits, parent attachment, and their parents' marital conflict. Peers of the subjects also reported their perceptions of peer aggression and peer victimization. Based on the scores of peer aggression and peer victimization, each child was classified into one of the four groups: nonvictimized aggressors, aggressive victims, passive victims, and normative contrasts. For boys, nonvictimized aggressors were more sociable/active than both aggressive and passive victims. Aggressive victims were more shy/emotional than nonvictimized aggressors and normative contrasts, and were exposed to the highest parental marital conflict. For girls, passive victims were the least sociable/active among the four groups, and showed lower attachment to fathers than normative contrasts. Both aggressive and passive victims were more shy/emotional than nonvictimized aggressors and normative contrasts, and normative contrasts were exposed to the lowest parental marital conflict.

액티브 보안 기술

  • 방효찬;나중찬;손승원;박치항
    • 정보와 통신
    • /
    • 제19권8호
    • /
    • pp.128-136
    • /
    • 2002
  • 현재의 네트워크 보안 기술에 비해서 보다 강력한 대응을 수행할 수 있는 보안 메커니즘을 지니며, 새로운 환경 변화에 대한 필요한 보안 메커니즘을 보다 신속하게 도입하고, 중앙 집중적으로 효율적인 보안 관리를 지원하는 데 목표를 두고 연구되고 있는 분야가 액티브 보안 분야이다. 본 논문의 목적은 인터넷 인프라 자체가 취약하다는 근본적인 문제점을 해결하기 위해 호스트 단위 또는 소규모 네트워크 단위를 보호하는 것을 포함하여 유해한 트래픽이 사용자 컴퓨터 내지는 사용자 네트워크에 도달하기 이전에 차단하는 네트워크 생존성 차원에서 새로운 네트워크 보안 기술인 액티브 보안 기술에 대한 아이디어를 소개하는 것이다.

인텔리전트 대학시설 모형개발을 위한 실태조사 연구 (A Survey Study on the Development Model of Intelligent University Facilities)

  • 배정익;안병욱;박동소;이상호;이경회
    • 교육시설
    • /
    • 제5권1호
    • /
    • pp.44-52
    • /
    • 1998
  • Nowadays, social environment is rapidly changed toward globalization and information age, and which demands the new paradigm for active utilization of information system in the field of education and many others. The effort to adapt tele-communication technique to educational facilities and the planning to make virtual university come true are needed immediately. Intelligent Building system should be applied to educational facilities to cope with the changing and progressing building system. As a result of the surveying eleven domestic universities, it was found that library management system, administration automation system and office automation system were already introduced, but campus infrastructure such as network system and tele-communication system between buildings in campus have been constructed now. As the conclusion of this study, impeding factors and improvement direction for active utilization of intelligent building systems in university facilities were presented.

  • PDF

A Review of the Potency of Plant Extracts and Compounds from Key Families as an Alternative to Synthetic Nematicides: History, Efficacy, and Current Developments

  • Mwamula, Abraham Okki;Kabir, Md. Faisal;Lee, DongWoon
    • The Plant Pathology Journal
    • /
    • 제38권2호
    • /
    • pp.53-77
    • /
    • 2022
  • The global nematicides market is expected to continue growing. With an increasing demand for synthetic chemical-free organic foods, botanical nematicides are taking the lead as replacements. Consequently, in the recent years, there have been vigorous efforts towards identification of the active secondary metabolites from various plants. These include mostly glucosinolates and their hydrolysis products such as isothiocyanates; flavonoids, alkaloids, limonoids, quassinoids, saponins, and the more recently probed essential oils, among others. And despite their overwhelming potential, variabilities in quality, efficacy, potency and composition continue to persist, and commercialization of new botanical nematicides is still lagging. Herein, we have reviewed the history of botanical nematicides and regional progresses, the potency of the identified phytochemicals from the key important plant families, and deciphered some of the impediments involved in standardization of the active compounds in addition to the concerns over the safety of the purified compounds to non-target microbial communities.

능동형 서비스 수준 계약의 표현 자동화 (Automated Representation of Active SLA's)

  • 김상락;배재학
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.279-282
    • /
    • 2011
  • 최근 기업들이 SOA, 웹 서비스, 유틸리티 컴퓨팅, 클라우드 컴퓨팅 등과 같은 서비스 지향적인 컴퓨팅 환경에 관심을 가지면서 SLA(Service Level Agreement) 기반의 자동화된 계약관리의 수요가 증가하고 있다. 일반적으로 기업에서는 종이에 자연언어로 표현된 SLA를 사용하고 있다. 이를 SLM(Service Level Management) 시스템에서 이해하고 계약조항을 직접 실행시키는 한 방법으로서 본 논문에서는 ASLA(Active SLA) 도입을 제안하였다. ASLA에서는 계약조항이 내용이 Prolog로 표현 된다.사람이 계약조항을 분석하여 Prolog로 표현할 때는 사람에 따라 변환 결과가 달라질 수 있을 뿐만 아니라 작업시간이 많이 소요된다는 단점이 있다. 본 논문에서는 제한된 자연어로 작성된 SLA를 APE(Attempto Parsing Engine)를 사용하여 ASLA를 얻는 방법을 제안한다. 그 방법의 핵심은 SLA ${\rightarrow}$ [APE Parser] ${\rightarrow}$ DRS(Discource Representation Structure) ${\rightarrow}$[drs2prolog] ${\rightarrow}$ Prolog 프로그램 ${\rightarrow}$ [prolog2xml] ${\rightarrow}$ ASLA로 요약할 수 있다.

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis

  • Guoyong Han;Hongluan Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.478-493
    • /
    • 2024
  • In this paper, the Mixed Integer Linear Programming (MILP) model is improved for searching differential characteristics of block cipher Midori-64, and 4 search strategies of differential path are given. By using strategy IV, set 1 S-box on the top of the distinguisher to be active, and set 3 S-boxes at the bottom to be active and the difference to be the same, then we obtain a 5-round differential characteristics. Based on the distinguisher, we attack 12-round Midori-64 with data and time complexities of 263 and 2103.83, respectively. To our best knowledge, these results are superior to current ones.

관로 조사를 위한 오토 인코더 기반 이상 탐지기법에 관한 연구 (A study on the auto encoder-based anomaly detection technique for pipeline inspection)

  • 김관태;이준원
    • 상하수도학회지
    • /
    • 제38권2호
    • /
    • pp.83-93
    • /
    • 2024
  • In this study, we present a sewer pipe inspection technique through a combination of active sonar technology and deep learning algorithms. It is difficult to inspect pipes containing water using conventional CCTV inspection methods, and there are various limitations, so a new approach is needed. In this paper, we introduce a inspection method using active sonar, and apply an auto encoder deep learning model to process sonar data to distinguish between normal and abnormal pipelines. This model underwent training on sonar data from a controlled environment under the assumption of normal pipeline conditions and utilized anomaly detection techniques to identify deviations from established standards. This approach presents a new perspective in pipeline inspection, promising to reduce the time and resources required for sewer system management and to enhance the reliability of pipeline inspections.

IP 주소 제한을 이용한 PC 절전 시스템 보안 설계 (A Design of PC Power-Saving System Security Using IP Address Restriction)

  • 김홍윤
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

우리나라 중소기업의 정보화 도입에 따른 몇 가지 문제점 (Some Problems of Information System on SMFs in Korea)

  • 윤영한
    • 통상정보연구
    • /
    • 제5권1호
    • /
    • pp.21-38
    • /
    • 2003
  • 21 century, Korea enterprise which run business in global market, has rapidly change. So, achievement of international competitive power is very important. IT(Information Telecommunication) Technology is play a leading role in this field. In fact, Korea enormous invest in informational technology field and hold the first place in informational quotient(information super-highway, server computer, mobile networking and firm's web site etc). But, materialization of information management effect consider how to cope with the situation. Korea SMEs(Small and Medium Enterprises) is fundamental in Korea economy. So Korea SMEs must active the international competitive power by information management and advance to a higher position. In conclusion, SMEs of information management is require that SMEs' CEO and CIO are must self-help to in this field. And governments improvement of connected with the related system in these field.

  • PDF

알코올중독자의 자녀를 위한 스트레스관리 프로그램이 정신건강상태와 스트레스 대처에 미치는 효과 (The Effects of a Stress Management Program on Mental Health and the Coping Behavior for the Children of Alcoholics)

  • 양승희;이평숙
    • 대한간호학회지
    • /
    • 제35권1호
    • /
    • pp.77-86
    • /
    • 2005
  • Purpose: The purpose of this study was to examine the effects of a stress management program on mental health and coping behavior for children of alcoholics. Method: Data was collected from January to February, 2003. The subjects were 20 adolescents from 13 to 18 years old. Data was analyzed using descriptive statistics, chi-square test, and t-test with the SAS program. Result: There were statistically significant differences in mental health, active coping, positive cognitive restructuring, and support-seeking for problem solving between the experimental group and the control group. Conclusion: The stress management program helped children of alcoholics by enhancing self-esteem, providing information about alcohol, and improving emotional and problem focused coping abilities. This eventually enhanced mental health.